Secure Conference Key Distribution Schemes for Conspiracy Attack
doi 10.1007/3-540-47555-9_37
Full Text
Open PDFAbstract
Available in full text
Date
Unknown
Authors
Publisher
Springer Berlin Heidelberg
Available in full text
Unknown
Springer Berlin Heidelberg